|
|
Workshops
FIDO Alliance Update
04.05.2015
14:00-18:00
The FIDO Alliance Update Seminar will provide an understanding of where the FIDO Alliance stands in its effort to address online authentication problems — problems best exemplified by the weakness of passwords! Recent announcements by companies including Google and Microsoft have demonstrated that the FIDO Standards are becoming the way to address authentication.
More information
|
|
|
OpenID Foundation Workshop
05.05.2015
09:00-13:00
This OpenID Foundation Workshop provides early insight and influence on important new online identity standards like the EIC Award-winning OpenID Connect. We will provide updates on the OpenID Connect Self Certification Test Suite and Mobile Profile Working Groups of OpenID Connect as well as other protocols in the pipeline like Account Chooser and Native Applications. Leading technology experts from Microsoft, Google, Ping Identity and others will update developments with these key protocols, review work group progress and discuss how they help meet enterprise business challenges.
More information
|
|
| |
The Foundations of API Security and API Gateway Technology
05.05.2015
09:00-13:00
This workshop will explore API gateway technology. What it is, how it’s applied today, the benefits of API gateway technology, and implementation examples.
More information
|
|
|
Kantara Workshop
05.05.2015
09:00-13:00
The Kantara Initiative annual EIC workshop will focus on the Kantara Initiative strategy for Connected Life & Access Management 2.0. Organizations of all types are faced with permanent change - in technology, markets, business models, and regulation. This continuously changing environment applies for organizations big and small, as well as local and global. Services that leverage identity and personal data are becoming pervasive and the identity data of people, organisations, applications and devices represents a user’s digital DNA.
More information
|
|
| |
Contextual Security Intelligence
05.05.2015
09:00-13:00
Behaviour-based approaches to detecting intrusions have recently gained importance and momentum as a complementary model to the purely knowledge based approach. Behavioural intrusion detection is based on the assumption, that intrusions regularly create deviations from the normal behaviour, which is defined by reference models. In permanently comparing network activity with the reference model, such deviations can be detected and used to create an alarm.
More information
|
|
|
|